Investment Services Industry Reports

Extracting actionable data from banking malware
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series demonstrates how actionable data can be extracted from banking malware and how it can be used to defend against highly damaging cyber attacks from organised criminal gangs.
Posted: 08 Feb 2021 | Published: 17 Aug 2016

TechTarget ComputerWeekly.com

The Future of Financial Services: Part 1
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the first part of our 'Future of Financial Services' e-guide series, we interview 5 fledgling fintech companies that are working on a wide range of products and services to help reduce costs and make businesses more effective.
Posted: 08 Feb 2021 | Published: 17 Oct 2018

TechTarget ComputerWeekly.com

Focus: Financial services in the cloud
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we'll take a look at how some of the world's biggest financial brands are moving to the cloud, and share a cautionary tale or two about the mistakes some have made while trying to get there.
Posted: 08 Feb 2021 | Published: 31 Jul 2017

TechTarget ComputerWeekly.com

2010 Asset Management Operations and Compensation Survey Findings
sponsored by Advent Software, Inc
WHITE PAPER: In this survey you will learn how asset management has changed over the years and the different challenges asset management professionals have been facing.
Posted: 18 May 2011 | Published: 17 May 2011

Advent Software, Inc

CRM Solutions For The Finance And Insurance Industries
sponsored by SAP America, Inc.
WHITE PAPER: Read this report to learn how Forrester Research rated 24 CRM solutions in terms of their strengths and weaknesses in supporting four key cross-functional processes in the finance and insurance industry.
Posted: 28 Mar 2012 | Published: 14 Feb 2011

SAP America, Inc.

The Future of Financial Services: Part 2
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the second part of our 'Future of Financial Services' e-guide series, read about how the financial services industry is not just being shaken up with cosmetic changes, but is about to go through the process of being stripped down and rebuilt.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

Mortgage Company Uses DataFlux Technology to Improve Reporting, Manage Compliance
sponsored by DataFlux Corporation
CASE STUDY: Read how using DataFlux technology, this financial company implemented a data governance program, creating more complete and accurate data and drastically reducing the time needed to comply with Federal reporting regulations.
Posted: 14 Jan 2009 | Published: 14 Jan 2009

DataFlux Corporation

Boost Government Revenues Without a Tax Increase
sponsored by SAP America, Inc.
WHITE PAPER: SAP analytics solutions can help today's government agencies overcome the many challenges associated with tax discovery. Read on to learn how SAP's public sector software solutions can benefit government agencies by improving performance, reducing costs and streamlining service delivery.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

SAP America, Inc.

Demystifying Customer Service Correspondence Work Flow in Cards
sponsored by Wipro
WHITE PAPER: Methods for capturing customer attention and loyalty may have changed over the years, but the basic DNA of business has not - a focus on establishing new customer relationships and retaining existing ones. This paper provides both a business & technology insight into the credit card customer service workflow.
Posted: 13 May 2009 | Published: 12 May 2009

Wipro

PCI compliance in the cloud: Can cloud service providers manage PCI?
sponsored by TechTarget Security
EGUIDE: Outsourcing credit card processing has emerged as a sensible solution for staying compliant with Payment Card Industry (PCI) demands, as well as a great way to cost-effectively cut down on risk.Read this expert guide to learn how outsourcing can help make life easier with a number of benefits.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security